Information System Monitoring Access Log Database on Database Server

10Citations
Citations of this article
80Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The purpose of the study was to build information system monitoring access log database on database server. Data security on the database is an absolute must. Not all users can access the data freely. It should only be accessible to those who have privileges only. Currently, it is still not known easily anyone who accesses the data or database. This research is done so that the built system can know easily who is the user who accesses the data on the server. Built-in web-based system using PHP and MySQL with monitoring and validation techniques on privileged access to the database. The resulting system is able to display the results of monitoring who the user is accessing data in real-time, so it can know which traffic access rights most frequently access the data. With this system can help to increase the use of privilege effectively and can perform monitoring of data, because it can be known for certain user whoever accesses the data.

Cite

CITATION STYLE

APA

Setiyadi, A., & Setiawan, E. B. (2018). Information System Monitoring Access Log Database on Database Server. In IOP Conference Series: Materials Science and Engineering (Vol. 407). Institute of Physics Publishing. https://doi.org/10.1088/1757-899X/407/1/012110

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free